SAN FRANCISCO – Cloud-based security and risk management solutions provider Qualys, on Monday, announced new vulnerability management capabilities for users of certain Amazon Web Services (AWS) offerings.
The solution utilizes the QualysGuard connector and Amazon APIs to automate the discovery and tracking of assets in Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) environments, and allows them to be automatically scanned for vulnerabilities, and provides reports giving customers visibility and control of security and compliance in their cloud environments.
Additionally, QualysGuard can now detect and synchronize changes to customers’ virtual machine instance inventories in the said AWS environments, also allowing the instances to be tracked over time, even as their IP addresses change, This, Qualys, says, allows security teams to automate vulnerability assessments using QualysGuard workflows. For example, assets can be scanned automatically after first discovery, on a regular calendar schedule, at intervals based upon each instance’s uptime, selectively based upon particular attributes of each instance, or some combination of factors, Qualys, said.
New capabilities announced by Qualys include:
• Native AWS API connectors can be configured to connect QualysGuard to one or more AWS accounts to synchronize asset inventories from all AWS Regions and Amazon VPCs. Important instance attributes and contextual metadata are collected and updated as they change over time. Dynamic Asset Tags, which can drive or influence policies and reporting throughout QualysGuard, may be automatically assigned to assets as part of the import process. Attributes and contextual metadata about Amazon EC2 instances are also captured and available as data points to inform further Dynamic Asset Tagging within QualysGuard.
• Vulnerability scanning, pre-authorized by Amazon. In collaboration with AWS, Qualys has built safeguards into a new Amazon EC2 Scanning capability within QualysGuard that help ensure that scanning will not inadvertently target other AWS customers’ instances and that all AWS policies for vulnerability scanning are adhered to. Based upon this, customers may scan at their convenience, as Amazon EC2 Scanning using QualysGuard has been pre-authorized by AWS, negating the need to obtain explicit permission from AWS before proceeding with scanning as is typically required.
• Enhancements to the QualysGuard Virtual Scanner Appliance AMI (Amazon Machine Image) – Qualys now has a scanner release in AWS Marketplace designated as “Pre-Authorized” for use with the Amazon EC2 Scanning capability within QualysGuard that leverages the AWS API connection.
“Many organizations moving assets to cloud environments are lacking the tools to effectively manage security and assess their compliance posture,” said Philippe Courtot, chairman and CEO for Qualys. “Now, working with AWS and leveraging their open APIs, we are able to provide our customers with a comprehensive solution to address their security and compliance within AWS’s cloud environments.”
The new AWS-focused features are available immediately for Qualys customers as part of their QualysGuard subscriptions. Subscriptions for QualysGuard run on an annual basis and start at $2,495 per year for 32 IPs. At least one QualysGuard Virtual Scanner Appliance license at $995 per year is required for internal network scanning functionality on AWS, the company said.
More information on QualysGuard for AWS is available here.

More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
